000 -LEADER |
fixed length control field |
02113cam a2200265 a 4500 |
001 - CONTROL NUMBER |
control field |
vtls001935360 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
MY-SjTCS |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20200226121353.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
110218s1997 flua f 00 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0849385237 |
039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE] |
Level of rules in bibliographic description |
201209131753 |
Level of effort used to assign nonsubject heading access points |
izani |
Level of effort used to assign subject headings |
201102181742 |
Level of effort used to assign classification |
VLOAD |
Level of effort used to assign subject headings |
200811241754 |
Level of effort used to assign classification |
VLOAD |
-- |
200407271917 |
-- |
VLOAD |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.82 |
Item number |
MEN |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Menezes, A. J. |
Fuller form of name |
(Alfred J.), |
Dates associated with a name |
1965- |
9 (RLIN) |
11575 |
245 10 - TITLE STATEMENT |
Title |
Handbook of applied cryptography / |
Statement of responsibility, etc. |
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Boca Raton, Fla. : |
Name of publisher, distributor, etc. |
CRC Press, |
Date of publication, distribution, etc. |
c1997. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxviii, 780 p. : |
Other physical details |
ill. ; |
Dimensions |
26 cm. |
490 #4 - SERIES STATEMENT |
Series statement |
The CRC Press series on discrete mathematics and its applications |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
List of Tables. - List of Figures. - Foreword by R.L. Rivest. - Preface. - 1. Overview of Cryptography. - 2. Mathematical Background. - 3. Number-Theoretic Reference Problems. - 4. Public-Key Parameters. - 5. Pseudorandom Bits and Sequences. - 6. Stream Ciphers. - 7. Block Ciphers. - 8. Public-Key Encryption. - 9. Hash Functions and Data Integrity. - 10. Identification and Entity Authentication. - 11. Digital Signatures. - 12. Key Establishment Protocols. - 13. Key Management Techniques. - 14. Efficient Implementation. - 15. Patents and Standards. - A. Bibliography of Papers from Selected Cryptographic Forums. - References. - Index. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
This book is intended as a reference for professional cryptographers, presenting the techniques and algorithms of greatest interest to the current practitioner, along with the supporting motivation and background material. It also provides a comprehensive source from which to learn cryptography, serving both students and instructors. In addition, the rigorous treatment, breadth, and extensive bibliographic material should make it an important reference for research professionals. - Back cover. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computers |
General subdivision |
Access control |
Form subdivision |
Handbooks, manuals, etc. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Cryptography |
Form subdivision |
Handbooks, manuals, etc. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Van Oorschot, Paul C. |
9 (RLIN) |
104047 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Vanstone, Scott A. |
9 (RLIN) |
104048 |
920 ## - Programme |
Programme |
SOCIT : 560460 |
999 ## - SYSTEM CONTROL NUMBERS (KOHA) |
Koha biblionumber |
181674 |
Koha biblioitemnumber |
181674 |